A recipe for cyber safety 
By Tony Campbell | Feb 24, 2015 | Comment Now 
A good dose of awareness and a sprinkling of ingrained mistrust.
Backdoor trojan discovered stalking high-profile targets 
Nov 24, 2014 | Comment Now 
Compared to Duqu and Stuxnet.
Zombie Zero ups the APT ante 
By Juha Saarinen | Jul 16, 2014 | Comment Now 
[Blog post] Is your supply chain the next attack vector?
Whitepaper: Trend Micro's 10 step APT action plan 
Oct 16, 2013 | Comment Now 
Reconsider your current situational awareness, level of preparation and operative ability.
Australian orgs possibly hit in hacker-for-hire attacks 
By Darren Pauli | Sep 26, 2013 | Comment Now 
Mercenary group hits Windows, Mac with 'Icefog' backdoor.
Revised icode applied to mobiles 
By Brett Winterford | Jun 4, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
Revised icode applied to mobile devices 
By Brett Winterford | May 31, 2013 | Comment Now 
ISPs asked to cut off infected tablets, smartphones.
Gartner: Integrate IAM and SIEM to fight advanced threats 
Students turn incident responders in DSD hackathon  
By Darren Pauli | Mar 8, 2013 | Comment Now 
Cyber Security Challenge opens doorways to security careers in Telstra, Fed Govt.
51 critical infrastructure organisations breach in 2012: report 
Melbourne biz beats ransomware with backups 
By Darren Pauli | Feb 13, 2013 | Comment Now 
Air-gapped data saves small business $5000.
CERT Australia rebuffs ex-staff criticism 
By Darren Pauli | Feb 8, 2013 | Comment Now 
Says 'teething problems' are past.
Gillard unveils cyber security coordination centre 
By Darren Pauli | Jan 23, 2013 | Comment Now 
World-class facility combines departmental efforts.
Gillard launches cyber security centre 
By Darren Pauli | Jan 23, 2013 | Comment Now 
Defence, ASIO, and Federal Police aim for better coordination.
Attacks spike against Lockheed Martin 
By Dan Raywood | Nov 14, 2012 | Comment Now 
Sophisticated attacks launched.
Lockheed Martin suppliers targeted by cyber attackers 
By Andrea Shalal-Esa | Nov 14, 2012 | Comment Now 
Seen as more likely avenue to extract information.
Hikit targets US defense contractors  
By Danielle Walker | Aug 28, 2012 | Comment Now 
The advanced persistent threat malware exploits existing vulnerabilities in servers, enabling attackers to maintain access to victims' data while remaining below the radar.
CERT Australia polls incident response in critical infrastructure 
By Darren Pauli | Jul 20, 2012 | Comment Now 
Survey gauges how breached organisations handled attacks.
iCode review tackles public wifi malware 
By Darren Pauli | Jun 14, 2012 | Comment Now 
Telcos, security experts discuss anti-botnet scheme.
Security boffins dissect iCode's future 
By Darren Pauli | Jun 13, 2012 | Comment Now 
Metrics and malware on the agenda for Sydney review.
Sign up to receive iTnews email bulletins
Latest Comments
Should law enforcement be able to buy and use exploits?

   |   View results
Only in special circumstances
Yes, but with more transparency